Reaction to Social Engineering Indicative of Cybersecurity Culture

During COVID-19, threat actors used fear of the virus and hope of a vaccine to trick unwitting victims into downloading malware or giving up their credentials. It was a master class in social engineering, one that put an organization’s security postur… Continue reading Reaction to Social Engineering Indicative of Cybersecurity Culture

EU to Launch Bloc-wide Rapid Response Joint Cyber Unit

By Deeba Ahmed
The task force is quite similar to Washington’s ransomware task force, but the EU’s version will coordinate with authorities across the bloc.
This is a post from HackRead.com Read the original post: EU to Launch Bloc-wide Rapid Response … Continue reading EU to Launch Bloc-wide Rapid Response Joint Cyber Unit

TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns

TikTok can now collect biometric data from user content, researchers find a vulnerability in Peloton bikes, and why some people think that Nextdoor might be the next big social network. ** Links mentioned on the show ** TikTok Can Now Collect Biometric… Continue reading TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns

The Business Value of the Social-Engineer Phishing Service

Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations.  Additionally, they are developing techniques to use an…
The post The Business Value of t… Continue reading The Business Value of the Social-Engineer Phishing Service

CISO Stories Podcast: So You Want to be a Cyber Spy?

Ira Winkler, CISO at Skyline Technology Solutions, recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author, and some of the crazy things that happened along the way – check it out… Continue reading CISO Stories Podcast: So You Want to be a Cyber Spy?

Biden-Putin Summit and Why Threat Actors Just Won’t Give it a Rest

On June 11, McDonald’s said in a message to its U.S. employees that it had discovered unauthorized activity on an internal security system. The burger chain responded by bringing on some external consultants to investigate what had happened, repor… Continue reading Biden-Putin Summit and Why Threat Actors Just Won’t Give it a Rest

AppSec Conference: Shifting Left 2.0

Sessions to watch for developers and hackers
Photo by Austin Distel on Unsplash
Here at ShiftLeft, we are gearing up for Shifting Left 2.0, a two-day application security conference for developers and security practitioners on June 22–23, 2021. It has … Continue reading AppSec Conference: Shifting Left 2.0

Deja Vu: What Do NotPetya and SolarWinds Have in Common?

As I was waking up in Boston on the morning of June 27, 2017, reports were being shared on social media that an electric power supplier in Ukraine was hit by a cyber attack. Within about an hour, a Danish power supplier was also knocked offline an… Continue reading Deja Vu: What Do NotPetya and SolarWinds Have in Common?

Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 3

For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal important technical and operational information. When… Continue reading Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 3

Ransomware Attacks are Evolving: What You Need to Know

One look at all the ransomware attacks from the past few years, and it’s clear that crypto-malware actors are attempting to maximize their financial gain. We’ve observed these threat groups using multiple techniques to profit even more off their v… Continue reading Ransomware Attacks are Evolving: What You Need to Know